بازگشت به فرم جستجو »

نمایش نتایج جستجو برای

کلمات کلیدی: attack


موارد یافت شده: 29

1 - Laboratory investigation on the fracture toughness (Mode I) and durability properties of eco-friendly cement emulsified asphalt mortar (CRTS II) exposed to acid attack (چکیده)
2 - CAPTAIN: Community-based Advanced Persistent Threat Analysis in IT Networks (چکیده)
3 - Moving Target Defense against Advanced Persistent Threats for Cybersecurity Enhancement (چکیده)
4 - Numerical study of the effect of winglet on the aerodynamic performance of sinusoidal and simple leading-edge wings (چکیده)
5 - Machine Learning Methods for Intrusive Detection of Wormhole Attack in Mobile Ad Hoc Network (MANET) (چکیده)
6 - SCiMet: Stable, sCalable and reliable Metric-based framework for quality assessment in collaborative content generation systems (چکیده)
7 - ARisk Estimation Framework for Security Threats in Computer Networks (چکیده)
8 - Extension of Cube Attack with Probabilistic Equations and its Application on Cryptanalysis of KATAN Cipher. (چکیده)
9 - Cube distinguisher extraction using division property in block ciphers (چکیده)
10 - Anomaly Detection in Smart Grid With Help of an Improved OPTICS Using Coefficient of Variation (چکیده)
11 - FUMBOT: Design, Implementation and Detectoin (چکیده)
12 - Anomaly ‐ based DoS detection and prevention in SIP networks by modeling SIP normal traffic (چکیده)
13 - Academic Information Security Researchers: Hackers or Specialists? (چکیده)
14 - A foresight model for intrusion response management (چکیده)
15 - Causal Knowledge Analysis for Detecting and Modeling (چکیده)
16 - Modeling SIP Normal Traffic to Detect and Prevent SIP-VoIP Flooding Attacks Using Fuzzy Logic (چکیده)
17 - A comprehensive approach for network attack forecasting (چکیده)
18 - An Empirical Study of Security of Voip System (چکیده)
19 - Network Security Risk Mitigation using Bayesian Decision Networks (چکیده)
20 - Robust image watermarking based on ICA-DCT and noise augmentation technique (چکیده)
21 - Robust image watermarking based on ICA-DCT and noise augmentation technique (چکیده)
22 - Analysis and Improving the Security of the Scalar Costa Scheme against Known Message Attack (چکیده)
23 - Comparative investigations in the effect of angle of attack profile on hydrodynamic performance of bio-inspired foil, (corrected) (چکیده)
24 - Influence of heat treatment on microstructure and passivity of Cu–30Zn–1Sn alloy in buffer solution containing chloride ions (چکیده)
25 - Securing Embedded Processors against Power Analysis based Side Channel Attacks using Reconfigurable Architecture (چکیده)
26 - A Survey on How to Break Hash Functions (چکیده)
27 - Ontology-based Distributed Intrusion Detection System (چکیده)
28 - Application of string matching in internet security and reliability (چکیده)
29 - Full Navier-Stokes Computations of Supersonic Flows over a Body at High Angles of Attack and Investigation of Crossflow Separation (چکیده)